Step-by-step guide with screenshots "How to lease out part of your computer's memory into Memority system to store data"?

* *You need to have a public IP-address to become a hoster. Otherwise you will be added to hosters list but nobody will be able to upload files to your computer. To receive a public IP-address contact your Internet Service Provider.

*The ability to choose disk and folder to use for storage is under development.

Option 1: You are already a Memority user.

1. Press "Become a hoster" on “Settings” tab.

2. Wait for your address to be added to hosters list. Now you can select disk volume that you want to allocate for hosting.

Option 2: You are just creating the account

1. Follow the instuction "App installation and account creation". After you receive tokens, choose an option “Be a hoster” if you want to host files only or “Both” if you want to host and store files.

2. Wait for your address to be added to hosters list. Now you can select disk volume that you want to allocate for hosting.

Memority is the platform for a completely decentralized, ultra-secure storage of valuable data on the blockchain, which ensures the continued availability of several encrypted copies of data on unrelated storage locations around the world.

The data is encrypted with your private key

No one except the owner can physically view the contents of the files, because they are encrypted with a private key, which is stored only by the data owner

Data is protected from accidental deletion

The system always stores multiple copies of data (default is 10), the monitoring system will periodically check their availability and creates new copies in other stores in case of insufficient number of duplicates

Data is protected from forgery

Unique data identifiers are stored in the blockchain database, the system regularly searches for fakes and restores the correct number of copies with genuine data if files have been forged

The system is completely self-contained and independent

Data storage, the process of files copies monitoring and recovering, data encryption and validation for authenticity are completely decentralized, there is no dependence on any centralized systems